Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Quantum Security's Blind Spot: When Eavesdroppers Fly Under the Radar by Arvind Sundararajan

Comments
2 min read
# Day 7 — Patch & Tool Maintenance (Deeper into the Forest)
Cover image for # Day 7 — Patch & Tool Maintenance (Deeper into the Forest)

# Day 7 — Patch & Tool Maintenance (Deeper into the Forest)

Comments
2 min read
Computer Systems Security An Introduction (Part 1)
Cover image for Computer Systems Security An Introduction (Part 1)

Computer Systems Security An Introduction (Part 1)

Comments 1
2 min read
What Is a Cookie? A Clear Introduction from the Basics (Part 1)

What Is a Cookie? A Clear Introduction from the Basics (Part 1)

Comments 1
3 min read
Building SlimShield: A Production-Ready Docker Security Platform with 18 Advanced Features 🚀

Building SlimShield: A Production-Ready Docker Security Platform with 18 Advanced Features 🚀

Comments
3 min read
The 5 Identity Controls Every Modern Enterprise Is Missing in 2025
Cover image for The 5 Identity Controls Every Modern Enterprise Is Missing in 2025

The 5 Identity Controls Every Modern Enterprise Is Missing in 2025

Comments
1 min read
📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups
Cover image for 📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups

📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups

Comments
2 min read
How to Secure Your Python Project (A Practical Guide)

How to Secure Your Python Project (A Practical Guide)

Comments
2 min read
New in Symfony 7.4: Signing Messages
Cover image for New in Symfony 7.4: Signing Messages

New in Symfony 7.4: Signing Messages

1
Comments
7 min read
Homeowners Insurance: Stop Guessing and Unlock the 4 Types of Coverage You Really Need

Homeowners Insurance: Stop Guessing and Unlock the 4 Types of Coverage You Really Need

Comments
3 min read
Critical High-Risk Alert: Severe Remote Code Execution Vulnerability in Next.js and React (CVE-2025-66478 / CVE-2025-55182)

Critical High-Risk Alert: Severe Remote Code Execution Vulnerability in Next.js and React (CVE-2025-66478 / CVE-2025-55182)

Comments
4 min read
Verified Targeted Scraping Attacks and the “Shadow Wizard Money Gang” – In-Depth Analysis
Cover image for Verified Targeted Scraping Attacks and the “Shadow Wizard Money Gang” – In-Depth Analysis

Verified Targeted Scraping Attacks and the “Shadow Wizard Money Gang” – In-Depth Analysis

Comments
12 min read
🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

🛡️ Ethical Hacking Lab Walkthrough: Website Cloning & SMB Enumeration (Beginner-Friendly)

Comments
4 min read
Building a Cost-Effective Autonomous Threat Containment System on AWS
Cover image for Building a Cost-Effective Autonomous Threat Containment System on AWS

Building a Cost-Effective Autonomous Threat Containment System on AWS

Comments
4 min read
Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Comments
3 min read
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
From PKIX errors to a clean mTLS + Feign + IAM demo
Cover image for From PKIX errors to a clean mTLS + Feign + IAM demo

From PKIX errors to a clean mTLS + Feign + IAM demo

Comments
4 min read
My First Ethical Open Redirect Scanner: From Zero to Shipped

My First Ethical Open Redirect Scanner: From Zero to Shipped

6
Comments
3 min read
Technical Overview of Infrared Thermography for Electrical Systems

Technical Overview of Infrared Thermography for Electrical Systems

Comments 2
3 min read
how do you trust a third party API?
Cover image for how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare
Cover image for How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master
Cover image for # Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

Comments
3 min read
loading...